diff --git a/programs/network/ssh/aes256-cbc.inc b/programs/network/ssh/aes256-cbc.inc index cc1c5550f4..88532c9ca4 100644 --- a/programs/network/ssh/aes256-cbc.inc +++ b/programs/network/ssh/aes256-cbc.inc @@ -16,7 +16,7 @@ ; along with this program. If not, see . struct aes256_cbc_context aes256_context - vector rb 16 + vector rb AES256_BLOCKSIZE ends @@ -25,10 +25,10 @@ proc aes256_cbc_init _vector mcall 68, 12, sizeof.aes256_cbc_context ; handle errors - mov ecx, 16/4 + mov ecx, AES256_BLOCKSIZE/4 mov esi, [_vector] lea edi, [eax + aes256_cbc_context.vector] - rep movsd + rep movsd ; rep movsd is slow, but we don't care while init pop edi esi ebx @@ -39,24 +39,16 @@ proc aes256_cbc_encrypt _ctx, _in, _out push ebx esi edi DEBUGF 1,'plain : ' - stdcall dump_128bit_hex, [_in] - DEBUGF 1,'\n' + stdcall dump_hex, [_in], 4 mov edi, [_ctx] lea edi, [edi + aes256_cbc_context.vector] mov esi, [_in] +repeat AES256_BLOCKSIZE/4 lodsd xor eax, [edi] stosd - lodsd - xor eax, [edi] - stosd - lodsd - xor eax, [edi] - stosd - lodsd - xor eax, [edi] - stosd +end repeat mov esi, [_ctx] lea eax, [esi + aes256_cbc_context.key] @@ -66,25 +58,33 @@ proc aes256_cbc_encrypt _ctx, _in, _out mov esi, [_out] mov eax, [_ctx] lea edi, [eax + aes256_cbc_context.vector] +repeat AES256_BLOCKSIZE/4 movsd - movsd - movsd - movsd +end repeat DEBUGF 1,'cipher : ' - stdcall dump_128bit_hex, [_out] - DEBUGF 1,'\n\n' + stdcall dump_hex, [_out], 4 pop edi esi ebx ret endp proc aes256_cbc_decrypt _ctx, _in, _out + +locals + temp_iv rb AES256_BLOCKSIZE +endl + push ebx esi edi DEBUGF 1,'cipher : ' - stdcall dump_128bit_hex, [_in] - DEBUGF 1,'\n' + stdcall dump_hex, [_in], 4 + + mov esi, [_in] + lea edi, [temp_iv] +repeat AES256_BLOCKSIZE/4 + movsd +end repeat mov esi, [_ctx] lea eax, [esi + aes256_cbc_context.key] @@ -93,30 +93,21 @@ proc aes256_cbc_decrypt _ctx, _in, _out mov esi, [_ctx] lea esi, [esi + aes256_cbc_context.vector] mov edi, [_out] +repeat AES256_BLOCKSIZE/4 lodsd xor eax, [edi] stosd - lodsd - xor eax, [edi] - stosd - lodsd - xor eax, [edi] - stosd - lodsd - xor eax, [edi] - stosd +end repeat - mov esi, [_in] + lea esi, [temp_iv] mov edi, [_ctx] lea edi, [edi + aes256_cbc_context.vector] +repeat AES256_BLOCKSIZE/4 movsd - movsd - movsd - movsd +end repeat DEBUGF 1,'plain : ' - stdcall dump_128bit_hex, [_out] - DEBUGF 1,'\n\n' + stdcall dump_hex, [_out], 4 pop edi esi ebx ret diff --git a/programs/network/ssh/aes256-ctr.inc b/programs/network/ssh/aes256-ctr.inc index 8db1379a6d..17e79a5db0 100644 --- a/programs/network/ssh/aes256-ctr.inc +++ b/programs/network/ssh/aes256-ctr.inc @@ -16,8 +16,8 @@ ; along with this program. If not, see . struct aes256_ctr_context aes256_context - counter rb 16 - output rb 16 ; counter after aes_crypt + counter rb AES256_BLOCKSIZE + output rb AES256_BLOCKSIZE ; counter after aes_crypt ends @@ -26,10 +26,10 @@ proc aes256_ctr_init _counter mcall 68, 12, sizeof.aes256_ctr_context ; handle errors - mov ecx, 16/4 + mov ecx, AES256_BLOCKSIZE/4 mov esi, [_counter] lea edi, [eax + aes256_ctr_context.counter] - rep movsd + rep movsd ; rep movsd is slow, but we don't care while init pop edi esi ebx @@ -42,8 +42,7 @@ proc aes256_ctr_crypt _ctx, _in, _out push ebx esi edi DEBUGF 1,'plain : ' - stdcall dump_128bit_hex, [_in] - DEBUGF 1,'\n' + stdcall dump_hex, [_in], 4 mov esi, [_ctx] lea eax, [esi + aes256_ctr_context.key] @@ -101,8 +100,7 @@ proc aes256_ctr_crypt _ctx, _in, _out mov dword[esi + aes256_ctr_context.counter + 4*3], edx DEBUGF 1,'cipher : ' - stdcall dump_128bit_hex, [_out] - DEBUGF 1,'\n\n' + stdcall dump_hex, [_out], 4 pop edi esi ebx ret diff --git a/programs/network/ssh/aes256.inc b/programs/network/ssh/aes256.inc index 85aa747897..3d949fb8ac 100644 --- a/programs/network/ssh/aes256.inc +++ b/programs/network/ssh/aes256.inc @@ -16,26 +16,13 @@ ; You should have received a copy of the GNU General Public License ; along with this program. If not, see . -AES256_ROUNDS = 14 +AES256_ROUNDS = 14 +AES256_BLOCKSIZE = 16 struct aes256_context key rd 4*(AES256_ROUNDS+1) ends -proc dump_128bit_hex _ptr - pushad - - mov esi, [_ptr] - mov ecx, 4 - .next_dword: - lodsd - bswap eax - DEBUGF 1,'%x',eax - loop .next_dword - - popad - ret -endp proc aes256_set_encrypt_key _ctx, _userkey locals @@ -48,30 +35,11 @@ endl mov esi, [_userkey] lea edi, [ebx + aes256_context.key] +repeat 8 lodsd bswap eax stosd - lodsd - bswap eax - stosd - lodsd - bswap eax - stosd - lodsd - bswap eax - stosd - lodsd - bswap eax - stosd - lodsd - bswap eax - stosd - lodsd - bswap eax - stosd - lodsd - bswap eax - stosd +end repeat lea esi, [ebx + aes256_context.key] @@ -176,7 +144,6 @@ endl jmp .while .done: - DEBUGF 1,' \n' pop edi esi ebx ret endp @@ -266,8 +233,7 @@ endl push ebx esi edi DEBUGF 1,'input : ' - stdcall dump_128bit_hex, [_in] - DEBUGF 1,'\n' + stdcall dump_hex, [_in], 4 mov ebx, [_key] mov esi, [_in] @@ -663,8 +629,7 @@ endl stosd DEBUGF 1,'output : ' - stdcall dump_128bit_hex, [_out] - DEBUGF 1,'\n' + stdcall dump_hex, [_out], 4 pop edi esi ebx ret @@ -679,8 +644,7 @@ endl push ebx esi edi DEBUGF 1,'input : ' - stdcall dump_128bit_hex, [_in] - DEBUGF 1,'\n' + stdcall dump_hex, [_in], 4 mov ebx, [_key] mov esi, [_in] @@ -1073,8 +1037,7 @@ endl stosd DEBUGF 1,'output : ' - stdcall dump_128bit_hex, [_out] - DEBUGF 1,'\n' + stdcall dump_hex, [_out], 4 pop edi esi ebx ret diff --git a/programs/network/ssh/dh_gex.inc b/programs/network/ssh/dh_gex.inc index 434bc90714..35db9154d1 100644 --- a/programs/network/ssh/dh_gex.inc +++ b/programs/network/ssh/dh_gex.inc @@ -25,39 +25,39 @@ proc dh_gex ;---------------------------------------------- ; >> Send Diffie-Hellman Group Exchange Request - DEBUGF 1, "Sending GEX\n" - stdcall ssh_send_packet, [socketnum], ssh_gex_req, ssh_gex_req.length, 0 + DEBUGF 2, "Sending GEX\n" + stdcall ssh_send_packet, con, ssh_gex_req, ssh_gex_req.length, 0 cmp eax, -1 je .socket_err ;--------------------------------------------- ; << Parse Diffie-Hellman Group Exchange Group - stdcall ssh_recv_packet, [socketnum], rx_buffer, BUFFERSIZE, 0 + stdcall ssh_recv_packet, con, 0 cmp eax, -1 je .socket_err - cmp [rx_buffer+ssh_header.message_code], SSH_MSG_KEX_DH_GEX_GROUP + cmp [con.rx_buffer.message_code], SSH_MSG_KEX_DH_GEX_GROUP jne proto_err - DEBUGF 1, "Received GEX group\n" + DEBUGF 2, "Received GEX group\n" - mov esi, rx_buffer+sizeof.ssh_header - mov edi, dh_p + mov esi, con.rx_buffer+sizeof.ssh_packet_header + mov edi, con.dh_p DEBUGF 1, "DH modulus (p): " call mpint_to_little_endian - stdcall mpint_print, dh_p + stdcall mpint_print, con.dh_p DEBUGF 1, "DH base (g): " - mov edi, dh_g + mov edi, con.dh_g call mpint_to_little_endian - stdcall mpint_print, dh_g + stdcall mpint_print, con.dh_g ;------------------------------------------- ; >> Send Diffie-Hellman Group Exchange Init ; generate a random number x, where 1 < x < (p-1)/2 - mov edi, dh_x+4 - mov [dh_x], DH_PRIVATE_KEY_SIZE/8 + mov edi, con.dh_x+4 + mov [con.dh_x], DH_PRIVATE_KEY_SIZE/8 mov ecx, DH_PRIVATE_KEY_SIZE/8/4 @@: push ecx @@ -71,352 +71,300 @@ proc dh_gex shl eax, 1 jnc @f mov byte[edi], 0 - inc dword[dh_x] + inc dword[con.dh_x] @@: ; Fill remaining bytes with zeros ; TO BE REMOVED ? if ((MAX_BITS-DH_PRIVATE_KEY_SIZE) > 0) mov ecx, (MAX_BITS-DH_PRIVATE_KEY_SIZE)/8/4 xor eax, eax - rep stosd + rep stosd end if DEBUGF 1, "DH x: " - stdcall mpint_length, dh_x;;;;;;;;;;;;; - stdcall mpint_print, dh_x + stdcall mpint_length, con.dh_x;;;;;;;;;;;;; + stdcall mpint_print, con.dh_x ; Compute e = g^x mod p - stdcall mpint_modexp, dh_e, dh_g, dh_x, dh_p - stdcall mpint_length, dh_e + stdcall mpint_modexp, con.dh_e, con.dh_g, con.dh_x, con.dh_p + stdcall mpint_length, con.dh_e DEBUGF 1, "DH e: " - stdcall mpint_print, dh_e + stdcall mpint_print, con.dh_e ; Create group exchange init packet - mov edi, tx_buffer+ssh_header.message_code + mov edi, con.tx_buffer.message_code mov al, SSH_MSG_KEX_DH_GEX_INIT stosb - mov esi, dh_e + mov esi, con.dh_e call mpint_to_big_endian - DEBUGF 1, "Sending GEX init\n" - mov ecx, dword[tx_buffer+ssh_header.message_code+1] + DEBUGF 2, "Sending GEX init\n" + mov ecx, dword[con.tx_buffer.message_code+1] bswap ecx add ecx, 5 - stdcall ssh_send_packet, [socketnum], tx_buffer+ssh_header.message_code, ecx, 0 + stdcall ssh_send_packet, con, con.tx_buffer.message_code, ecx, 0 cmp eax, -1 je .socket_err ;--------------------------------------------- ; << Parse Diffie-Hellman Group Exchange Reply - stdcall ssh_recv_packet, [socketnum], rx_buffer, BUFFERSIZE, 0 + stdcall ssh_recv_packet, con, 0 cmp eax, -1 je .socket_err - cmp [rx_buffer+ssh_header.message_code], SSH_MSG_KEX_DH_GEX_REPLY + cmp [con.rx_buffer.message_code], SSH_MSG_KEX_DH_GEX_REPLY jne .proto_err - DEBUGF 1, "Received GEX Reply\n" + DEBUGF 2, "Received GEX Reply\n" ;-------------------------------- -; HASH: string K_S, the host key - mov esi, rx_buffer+sizeof.ssh_header +; HASH: string K_S, the host key + mov esi, con.rx_buffer+sizeof.ssh_packet_header mov edx, [esi] bswap edx add edx, 4 lea ebx, [esi+edx] push ebx - call sha256_update + invoke sha256_update, con.temp_ctx, esi, edx ;-------------------------------------------------------------------------- -; HASH: uint32 min, minimal size in bits of an acceptable group -; uint32 n, preferred size in bits of the group the server will send -; uint32 max, maximal size in bits of an acceptable group - mov esi, ssh_gex_req+sizeof.ssh_header-ssh_header.message_code - mov edx, 12 - call sha256_update +; HASH: uint32 min, minimal size in bits of an acceptable group +; uint32 n, preferred size in bits of the group the server will send +; uint32 max, maximal size in bits of an acceptable group + invoke sha256_update, con.temp_ctx, ssh_gex_req+sizeof.ssh_packet_header-ssh_packet_header.message_code, 12 ;---------------------------- -; HASH: mpint p, safe prime - mov esi, dh_p +; HASH: mpint p, safe prime + mov esi, con.dh_p mov edi, mpint_tmp call mpint_to_big_endian lea edx, [eax+4] - mov esi, mpint_tmp - call sha256_update + invoke sha256_update, con.temp_ctx, mpint_tmp, edx ;---------------------------------------- -; HASH: mpint g, generator for subgroup - mov esi, dh_g +; HASH: mpint g, generator for subgroup + mov esi, con.dh_g mov edi, mpint_tmp call mpint_to_big_endian lea edx, [eax+4] - mov esi, mpint_tmp - call sha256_update + invoke sha256_update, con.temp_ctx, mpint_tmp, edx ;--------------------------------------------------- -; HASH: mpint e, exchange value sent by the client - mov esi, tx_buffer+sizeof.ssh_header +; HASH: mpint e, exchange value sent by the client + mov esi, con.tx_buffer+sizeof.ssh_packet_header mov edx, [esi] bswap edx add edx, 4 - call sha256_update + invoke sha256_update, con.temp_ctx, esi, edx ;--------------------------------------------------- -; HASH: mpint f, exchange value sent by the server +; HASH: mpint f, exchange value sent by the server mov esi, [esp] mov edx, [esi] bswap edx add edx, 4 - call sha256_update + invoke sha256_update, con.temp_ctx, esi, edx pop esi - mov edi, dh_f + mov edi, con.dh_f call mpint_to_little_endian DEBUGF 1, "DH f: " - stdcall mpint_print, dh_f + stdcall mpint_print, con.dh_f - mov edi, dh_signature + mov edi, con.dh_signature call mpint_to_little_endian DEBUGF 1, "DH signature: " - stdcall mpint_print, dh_signature + stdcall mpint_print, con.dh_signature ;-------------------------------------- ; Calculate shared secret K = f^x mod p - stdcall mpint_modexp, rx_buffer, dh_f, dh_x, dh_p - stdcall mpint_length, rx_buffer + stdcall mpint_modexp, con.rx_buffer, con.dh_f, con.dh_x, con.dh_p + stdcall mpint_length, con.rx_buffer DEBUGF 1, "DH K: " - stdcall mpint_print, rx_buffer + stdcall mpint_print, con.rx_buffer ; We always need it in big endian order, so store it as such. - mov edi, dh_K - mov esi, rx_buffer + mov edi, con.dh_K + mov esi, con.rx_buffer call mpint_to_big_endian - mov [dh_K.length], eax + mov [con.dh_K_length], eax ;----------------------------------- -; HASH: mpint K, the shared secret - mov edx, [dh_K.length] +; HASH: mpint K, the shared secret + mov edx, [con.dh_K_length] add edx, 4 - mov esi, dh_K - call sha256_update + invoke sha256_update, con.temp_ctx, con.dh_K, edx ;------------------------------- ; Finalize the exchange hash (H) - mov edi, dh_H - call sha256_final + invoke sha256_final, con.temp_ctx + mov esi, con.temp_ctx.hash + mov edi, con.dh_H + mov ecx, SHA256_HASH_SIZE/4 + rep movsd DEBUGF 1, "Exchange hash H: " - stdcall dump_256bit_hex, dh_H + stdcall dump_hex, con.dh_H, 8 ; TODO: skip this block when re-keying - mov esi, dh_H - mov edi, session_id - mov ecx, 32/4 + mov esi, con.dh_H + mov edi, con.session_id + mov ecx, SHA256_HASH_SIZE/4 rep movsd ;--------------- ; Calculate keys -; TODO: re-use partial hash of K and H +; First, calculate partial hash of K and H so we can re-use it for every key. + + invoke sha256_init, con.k_h_ctx + + mov edx, [con.dh_K_length] + add edx, 4 + invoke sha256_update, con.k_h_ctx, con.dh_K, edx + invoke sha256_update, con.k_h_ctx, con.dh_H, 32 ;--------------------------------------------------------------- ; Initial IV client to server: HASH(K || H || "A" || session_id) - call sha256_init - mov edx, [dh_K.length] - add edx, 4 - mov esi, dh_K - call sha256_update - mov edx, 32 - mov esi, dh_H - call sha256_update - mov edx, 1 - mov esi, str_A - call sha256_update - mov edx, 32 - mov esi, session_id - call sha256_update - mov edi, tx_iv - call sha256_final + mov esi, con.k_h_ctx + mov edi, con.temp_ctx + mov ecx, sizeof.ctx_sha224256/4 + rep movsd + mov [con.session_id_prefix], 'A' + invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1 + invoke sha256_final, con.temp_ctx.hash + mov edi, con.tx_iv + mov esi, con.temp_ctx + mov ecx, SHA256_HASH_SIZE/4 + rep movsd DEBUGF 1, "Remote IV: " - stdcall dump_256bit_hex, tx_iv + stdcall dump_hex, con.tx_iv, 8 ;--------------------------------------------------------------- ; Initial IV server to client: HASH(K || H || "B" || session_id) - call sha256_init - mov edx, [dh_K.length] - add edx, 4 - mov esi, dh_K - call sha256_update - mov edx, 32 - mov esi, dh_H - call sha256_update - mov edx, 1 - mov esi, str_B - call sha256_update - mov edx, 32 - mov esi, session_id - call sha256_update - mov edi, rx_iv - call sha256_final + mov esi, con.k_h_ctx + mov edi, con.temp_ctx + mov ecx, sizeof.ctx_sha224256/4 + rep movsd + inc [con.session_id_prefix] + invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1 + invoke sha256_final, con.temp_ctx + mov edi, con.rx_iv + mov esi, con.temp_ctx + mov ecx, SHA256_HASH_SIZE/4 + rep movsd DEBUGF 1, "Local IV: " - stdcall dump_256bit_hex, rx_iv + stdcall dump_hex, con.rx_iv, 8 ;------------------------------------------------------------------- ; Encryption key client to server: HASH(K || H || "C" || session_id) - call sha256_init - mov edx, [dh_K.length] - add edx, 4 - mov esi, dh_K - call sha256_update - mov edx, 32 - mov esi, dh_H - call sha256_update - mov edx, 1 - mov esi, str_C - call sha256_update - mov edx, 32 - mov esi, session_id - call sha256_update - mov edi, tx_enc_key - call sha256_final + mov esi, con.k_h_ctx + mov edi, con.temp_ctx + mov ecx, sizeof.ctx_sha224256/4 + rep movsd + inc [con.session_id_prefix] + invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1 + invoke sha256_final, con.temp_ctx + mov edi, con.tx_enc_key + mov esi, con.temp_ctx + mov ecx, SHA256_HASH_SIZE/4 + rep movsd DEBUGF 1, "Remote key: " - stdcall dump_256bit_hex, tx_enc_key + stdcall dump_hex, con.tx_enc_key, 8 ;------------------------------------------------------------------- ; Encryption key server to client: HASH(K || H || "D" || session_id) - call sha256_init - mov edx, [dh_K.length] - add edx, 4 - mov esi, dh_K - call sha256_update - mov edx, 32 - mov esi, dh_H - call sha256_update - mov edx, 1 - mov esi, str_D - call sha256_update - mov edx, 32 - mov esi, session_id - call sha256_update - mov edi, rx_enc_key - call sha256_final + mov esi, con.k_h_ctx + mov edi, con.temp_ctx + mov ecx, sizeof.ctx_sha224256/4 + rep movsd + inc [con.session_id_prefix] + invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1 + invoke sha256_final, con.temp_ctx + mov edi, con.rx_enc_key + mov esi, con.temp_ctx + mov ecx, SHA256_HASH_SIZE/4 + rep movsd DEBUGF 1, "Local key: " - stdcall dump_256bit_hex, rx_enc_key + stdcall dump_hex, con.rx_enc_key, 8 ;------------------------------------------------------------------ ; Integrity key client to server: HASH(K || H || "E" || session_id) - call sha256_init - mov edx, [dh_K.length] - add edx, 4 - mov esi, dh_K - call sha256_update - mov edx, 32 - mov esi, dh_H - call sha256_update - mov edx, 1 - mov esi, str_E - call sha256_update - mov edx, 32 - mov esi, session_id - call sha256_update - mov edi, tx_int_key - call sha256_final + mov esi, con.k_h_ctx + mov edi, con.temp_ctx + mov ecx, sizeof.ctx_sha224256/4 + rep movsd + inc [con.session_id_prefix] + invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1 + invoke sha256_final, con.temp_ctx + mov edi, con.tx_int_key + mov esi, con.temp_ctx + mov ecx, SHA256_HASH_SIZE/4 + rep movsd DEBUGF 1, "Remote Integrity key: " - stdcall dump_256bit_hex, tx_int_key + stdcall dump_hex, con.tx_int_key, 8 ;------------------------------------------------------------------ ; Integrity key server to client: HASH(K || H || "F" || session_id) - call sha256_init - mov edx, [dh_K.length] - add edx, 4 - mov esi, dh_K - call sha256_update - mov edx, 32 - mov esi, dh_H - call sha256_update - mov edx, 1 - mov esi, str_F - call sha256_update - mov edx, 32 - mov esi, session_id - call sha256_update - mov edi, rx_int_key - call sha256_final + mov esi, con.k_h_ctx + mov edi, con.temp_ctx + mov ecx, sizeof.ctx_sha224256/4 + rep movsd + inc [con.session_id_prefix] + invoke sha256_update, con.temp_ctx, con.session_id_prefix, 32+1 + invoke sha256_final, con.temp_ctx + mov edi, con.rx_int_key + mov esi, con.temp_ctx + mov ecx, SHA256_HASH_SIZE/4 + rep movsd DEBUGF 1, "Local Integrity key: " - stdcall dump_256bit_hex, rx_int_key + stdcall dump_hex, con.rx_int_key, 8 ;------------------------------------- ; << Parse Diffie-Hellman New Keys MSG - stdcall ssh_recv_packet, [socketnum], rx_buffer, BUFFERSIZE, 0 + stdcall ssh_recv_packet, con, 0 cmp eax, -1 je .socket_err - cmp [rx_buffer+ssh_header.message_code], SSH_MSG_NEWKEYS + cmp [con.rx_buffer.message_code], SSH_MSG_NEWKEYS jne .proto_err - DEBUGF 1, "Received New Keys\n" + DEBUGF 2, "Received New Keys\n" ;------------------------------- ; >> Reply with New Keys message - stdcall ssh_send_packet, [socketnum], ssh_new_keys, ssh_new_keys.length, 0 + stdcall ssh_send_packet, con, ssh_new_keys, ssh_new_keys.length, 0 xor eax, eax ret .socket_err: - DEBUGF 2, "Socket error during key exchange!\n" + DEBUGF 3, "Socket error during key exchange!\n" mov eax, 1 ret .proto_err: - DEBUGF 2, "Protocol error during key exchange!\n" + DEBUGF 3, "Protocol error during key exchange!\n" mov eax, 2 ret endp - -proc dump_256bit_hex _ptr - pushad - - mov esi, [_ptr] - mov ecx, 8 - .next_dword: - lodsd - bswap eax - DEBUGF 1,'%x',eax - loop .next_dword - DEBUGF 1,'\n' - - popad - ret -endp - -iglobal - - str_A db 'A' - str_B db 'B' - str_C db 'C' - str_D db 'D' - str_E db 'E' - str_F db 'F' - -endg \ No newline at end of file diff --git a/programs/network/ssh/hmac_sha256.inc b/programs/network/ssh/hmac_sha256.inc new file mode 100644 index 0000000000..61c2d0ffb4 --- /dev/null +++ b/programs/network/ssh/hmac_sha256.inc @@ -0,0 +1,171 @@ +; hmac.inc - HMAC: Keyed-Hashing for Message Authentication +; +; Copyright (C) 2016 Denis Karpenko +; Copyright (C) 2016 Jeffrey Amelynck +; +; This program is free software: you can redistribute it and/or modify +; it under the terms of the GNU General Public License as published by +; the Free Software Foundation, either version 3 of the License, or +; (at your option) any later version. +; +; This program is distributed in the hope that it will be useful, +; but WITHOUT ANY WARRANTY; without even the implied warranty of +; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +; GNU General Public License for more details. +; +; You should have received a copy of the GNU General Public License +; along with this program. If not, see . + +; Main concept: +; To compute HMAC over the data `text' we perform +; H(K XOR opad, H(K XOR ipad, text)) + +struct hmac_sha256_context + hash rb SHA256_HASH_SIZE + ipad_ctx ctx_sha224256 + opad_ctx ctx_sha224256 +ends + +; We will precompute partial hashes of K XOR ipad and K XOR opad, +; and store them in the context structure. + +proc hmac_sha256_setkey ctx, key, key_length + +locals + k_temp rb SHA224256_BLOCK_SIZE +endl + + pusha + +; input esi = key, ecx=key_length + mov ecx, [key_length] + cmp ecx, SHA224256_BLOCK_SIZE + ja .hash_it +; Key is smaller then or equal to blocksize, +; copy key to ipad + mov esi, [key] + lea edi, [k_temp] + rep movsb + mov ecx, SHA224256_BLOCK_SIZE + sub ecx, [key_length] + jz .finish +; append zeros to the key + xor al, al + rep stosb + jmp .finish + +; Given key is larger then key size, hash it + .hash_it: + invoke sha256_init, [ctx] + invoke sha256_update, [ctx], [key], [key_length] + invoke sha256_final, [ctx] + mov esi, [ctx] + lea edi, [k_temp] + mov ecx, SHA256_HASH_SIZE/4 + rep movsd + xor eax, eax + mov ecx, (SHA224256_BLOCK_SIZE-SHA256_HASH_SIZE)/4 + rep stosd + + .finish: +; xor ipad buffer with 0x36363... + lea esi, [k_temp] + mov ecx, SHA224256_BLOCK_SIZE/4 + @@: + xor dword[esi], 0x36363636 ; ipad constant + add esi, 4 + dec ecx + jnz @r + +; Init our hash with k_xor_ipad + mov ebx, [ctx] + lea edi, [ebx+hmac_sha256_context.ipad_ctx] + invoke sha256_init, edi + + lea esi, [k_temp] + DEBUGF 1, "HASH: " + stdcall dump_hex, esi, SHA224256_BLOCK_SIZE/4 + + mov ebx, [ctx] + lea edi, [ebx+hmac_sha256_context.ipad_ctx] + invoke sha256_update, edi, esi, SHA224256_BLOCK_SIZE + +; xor opad buffer with 0x5c5c5... + lea esi, [k_temp] + mov ecx, SHA224256_BLOCK_SIZE/4 + @@: + xor dword[esi], 0x36363636 xor 0x5c5c5c5c ; opad constant + add esi, 4 + dec ecx + jnz @r + +; Init our hash with k_xor_opad + mov ebx, [ctx] + lea edi, [ebx+hmac_sha256_context.opad_ctx] + invoke sha256_init, edi + + lea esi, [k_temp] + DEBUGF 1, "HASH: " + stdcall dump_hex, esi, SHA224256_BLOCK_SIZE/4 + + mov ebx, [ctx] + lea edi, [ebx+hmac_sha256_context.opad_ctx] + invoke sha256_update, edi, esi, SHA224256_BLOCK_SIZE + + popa + ret + +endp + +; Copy our pre-computed partial hashes to the stack, complete and finalize them. +; TODO: prevent unnescessary copying of output hash +; TODO: remove unnescessary pushing/popping + +proc hmac_sha256 ctx, _data, _length + +locals + inner_ctx ctx_sha224256 + outer_ctx ctx_sha224256 +endl + + pusha + DEBUGF 1, "HMAC: " + mov ebx, [_length] + shr ebx, 2 + stdcall dump_hex, [_data], ebx + +; Copy partial hashes of ipad and opad to our temporary buffers + mov esi, [ctx] + lea esi, [esi+hmac_sha256_context.ipad_ctx] + lea edi, [inner_ctx] +repeat (sizeof.ctx_sha224256)/4*2 + movsd +end repeat + +; Append provided data to inner hash and finalize + lea ebx, [inner_ctx] + invoke sha256_update, ebx, [_data], [_length] + lea ebx, [inner_ctx] + invoke sha256_final, ebx + + DEBUGF 1, "Inner Hash: " + lea esi, [inner_ctx.hash] + stdcall dump_hex, esi, SHA256_HASH_SIZE/4 + +; Calculate outer hash + lea ebx, [outer_ctx] + lea esi, [inner_ctx.hash] + invoke sha256_update, ebx, esi, SHA256_HASH_SIZE + lea ebx, [outer_ctx] + invoke sha256_final, ebx +; Copy output hash to ctx structure ; FIXME + lea esi, [outer_ctx.hash] + mov edi, [ctx] +repeat SHA256_HASH_SIZE/4 + movsd +end repeat + + popa + ret + +endp diff --git a/programs/network/ssh/mpint.inc b/programs/network/ssh/mpint.inc index 4ae0aaaeb6..3b729581f6 100644 --- a/programs/network/ssh/mpint.inc +++ b/programs/network/ssh/mpint.inc @@ -541,13 +541,13 @@ proc mpint_modexp uses edi eax ebx ecx, dst, base, exp, mod ret .mod_zero: - DEBUGF 1, "modexp with modulo 0\n" + DEBUGF 3, "modexp with modulo 0\n" ; if mod is zero, result = 0 stdcall mpint_zero, [dst] ret .exp_zero: - DEBUGF 1, "modexp with exponent 0\n" + DEBUGF 3, "modexp with exponent 0\n" ; if exponent is zero, result = 1 stdcall mpint_zero, [dst] mov eax, [dst] @@ -556,7 +556,7 @@ proc mpint_modexp uses edi eax ebx ecx, dst, base, exp, mod ret .invalid: - DEBUGF 1, "modexp: Invalid input!\n" + DEBUGF 3, "modexp: Invalid input!\n" ret endp \ No newline at end of file diff --git a/programs/network/ssh/ssh.asm b/programs/network/ssh/ssh.asm index 70f39fbcb9..c8b3ddf1ff 100644 --- a/programs/network/ssh/ssh.asm +++ b/programs/network/ssh/ssh.asm @@ -18,7 +18,7 @@ format binary as "" __DEBUG__ = 1 -__DEBUG_LEVEL__ = 1 +__DEBUG_LEVEL__ = 2 ; 1: Extreme debugging, 2: Debugging, 3: Errors only BUFFERSIZE = 4096 MAX_BITS = 8192 @@ -33,16 +33,17 @@ use32 dd i_end ; initialized size dd mem+4096 ; required memory dd mem+4096 ; stack pointer - dd hostname ; parameters + dd params ; parameters dd 0 ; path include '../../macros.inc' +;include '../../struct.inc' purge mov,add,sub include '../../proc32.inc' include '../../dll.inc' include '../../debug-fdo.inc' include '../../network.inc' -;include '../../develop/libraries/libcrash/trunk/libcrash.inc' +include '../../develop/libraries/libcrash/trunk/libcrash.inc' include 'mcodes.inc' include 'ssh_transport.inc' @@ -53,7 +54,7 @@ include 'random.inc' include 'aes256.inc' include 'aes256-ctr.inc' include 'aes256-cbc.inc' -include '../../fs/kfar/trunk/kfar_arc/sha256.inc' +include 'hmac_sha256.inc' ; macros for network byte order macro dd_n op { @@ -68,24 +69,120 @@ macro dw_n op { (((op) and 000FFh) shl 8) } +proc dump_hex _ptr, _length +if __DEBUG_LEVEL__ <= 1 + pushad + + mov esi, [_ptr] + mov ecx, [_length] + .next_dword: + lodsd + bswap eax + DEBUGF 1,'%x',eax + loop .next_dword + DEBUGF 1,'\n' + + popad + ret +end if +endp + +struct ssh_connection + +; Connection + + hostname rb 1024 + + socketnum dd ? + + sockaddr dw ? ; Address family + port dw ? + ip dd ? + rb 10 + +; Encryption/Decryption + + rx_crypt_proc dd ? + tx_crypt_proc dd ? + rx_crypt_ctx_ptr dd ? + tx_crypt_ctx_ptr dd ? + rx_crypt_blocksize dd ? + tx_crypt_blocksize dd ? + +; Message authentication + + rx_mac_proc dd ? + tx_mac_proc dd ? + rx_mac_ctx hmac_sha256_context + tx_mac_ctx hmac_sha256_context + rx_mac_length dd ? + tx_mac_length dd ? + +; Buffers + + rx_seq dd ? ; Packet sequence number for MAC + rx_buffer ssh_packet_header + rb BUFFERSIZE-sizeof.ssh_packet_header + + tx_seq dd ? ; Packet sequence number for MAC + tx_buffer ssh_packet_header + rb BUFFERSIZE-sizeof.ssh_packet_header + + send_data dw ? + +; Output from key exchange + dh_K dd ? ; Shared Secret (Big endian) + rb MAX_BITS/8 + dh_K_length dd ? ; Length in little endian + + dh_H rb 32 ; Exchange Hash + session_id_prefix db ? + session_id rb 32 + rx_iv rb 32 ; Rx initialisation vector + tx_iv rb 32 ; Tx initialisation vector + rx_enc_key rb 32 ; Rx encryption key + tx_enc_key rb 32 ; Tx encryption key + rx_int_key rb 32 ; Rx integrity key + tx_int_key rb 32 ; Tx integrity key + +; Diffie Hellman + dh_p dd ? + rb MAX_BITS/8 + dh_g dd ? + rb MAX_BITS/8 + dh_x dd ? + rb MAX_BITS/8 + dh_e dd ? + rb MAX_BITS/8 + dh_f dd ? + rb MAX_BITS/8 + + dh_signature dd ? + rb MAX_BITS/8 + + temp_ctx ctx_sha224256 + k_h_ctx ctx_sha224256 + +ends + start: mcall 68, 11 ; Init heap - DEBUGF 1, "SSH: Loading libraries\n" + DEBUGF 2, "SSH: Loading libraries\n" stdcall dll.Load, @IMPORT test eax, eax jnz exit - DEBUGF 1, "SSH: Init PRNG\n" + DEBUGF 2, "SSH: Init PRNG\n" call init_random - DEBUGF 1, "SSH: Init Console\n" + DEBUGF 2, "SSH: Init Console\n" invoke con_start, 1 invoke con_init, 80, 25, 80, 25, title -; Check for parameters - cmp byte[hostname], 0 - jne resolve +; Check for parameters TODO +; cmp byte[params], 0 +; jne resolve main: invoke con_cls @@ -96,7 +193,7 @@ prompt: ; write prompt invoke con_write_asciiz, str2 ; read string - mov esi, hostname + mov esi, con.hostname invoke con_gets, esi, 256 ; check for exit test eax, eax @@ -105,10 +202,11 @@ prompt: jz done resolve: - mov [sockaddr1.port], 22 shl 8 + mov [con.sockaddr], AF_INET4 + mov [con.port], 22 shl 8 ; delete terminating '\n' - mov esi, hostname + mov esi, con.hostname @@: lodsb cmp al, ':' @@ -130,21 +228,21 @@ resolve: jb hostname_error cmp al, 9 ja hostname_error - lea ebx, [ebx*4 + ebx] + lea ebx, [ebx*4+ebx] shl ebx, 1 add ebx, eax jmp .portloop .port_done: xchg bl, bh - mov [sockaddr1.port], bx + mov [con.port], bx .done: ; resolve name push esp ; reserve stack place push esp - invoke getaddrinfo, hostname, 0, 0 + invoke getaddrinfo, con.hostname, 0, 0 pop esi ; test for error test eax, eax @@ -152,7 +250,7 @@ resolve: invoke con_cls invoke con_write_asciiz, str3 - invoke con_write_asciiz, hostname + invoke con_write_asciiz, con.hostname ; write results invoke con_write_asciiz, str8 @@ -160,7 +258,7 @@ resolve: ; convert IP address to decimal notation mov eax, [esi+addrinfo.ai_addr] mov eax, [eax+sockaddr_in.sin_addr] - mov [sockaddr1.ip], eax + mov [con.ip], eax invoke inet_ntoa, eax ; write result invoke con_write_asciiz, eax @@ -176,47 +274,56 @@ resolve: mcall socket, AF_INET4, SOCK_STREAM, 0 cmp eax, -1 jz socket_err - mov [socketnum], eax + mov [con.socketnum], eax ; Connect - mcall connect, [socketnum], sockaddr1, 18 + DEBUGF 2, "Connecting to server\n" + mcall connect, [con.socketnum], con.sockaddr, 18 test eax, eax jnz socket_err -; Start calculating hash meanwhile - call sha256_init +; Start calculating hash + invoke sha256_init, con.temp_ctx ; HASH: string V_C, the client's version string (CR and NL excluded) - mov esi, ssh_ident_ha - mov edx, ssh_ident.length+4-2 - call sha256_update + invoke sha256_update, con.temp_ctx, ssh_ident_ha, ssh_ident.length+4-2 -; Send our identification string - DEBUGF 1, "Sending ID string\n" - mcall send, [socketnum], ssh_ident, ssh_ident.length, 0 +; >> Send our identification string + DEBUGF 2, "Sending ID string\n" + mcall send, [con.socketnum], ssh_ident, ssh_ident.length, 0 cmp eax, -1 je socket_err -; Check protocol version of server - mcall recv, [socketnum], rx_buffer, BUFFERSIZE, 0 +; << Check protocol version of server + mcall recv, [con.socketnum], con.rx_buffer, BUFFERSIZE, 0 cmp eax, -1 je socket_err - DEBUGF 1, "Received ID string\n" - cmp dword[rx_buffer], "SSH-" + DEBUGF 2, "Received ID string\n" + cmp dword[con.rx_buffer], "SSH-" jne proto_err - cmp dword[rx_buffer+4], "2.0-" + cmp dword[con.rx_buffer+4], "2.0-" jne proto_err ; HASH: string V_S, the server's version string (CR and NL excluded) lea edx, [eax+2] sub eax, 2 bswap eax - mov [rx_buffer-4], eax - mov esi, rx_buffer-4 - call sha256_update + mov dword[con.rx_buffer-4], eax + invoke sha256_update, con.temp_ctx, con.rx_buffer-4, edx -; Key Exchange init - DEBUGF 1, "Sending KEX init\n" +; >> Key Exchange init + mov [con.rx_seq], 0 + mov [con.tx_seq], 0 + mov [con.rx_crypt_blocksize], 4 ; minimum blocksize + mov [con.tx_crypt_blocksize], 4 + mov [con.rx_crypt_proc], 0 + mov [con.tx_crypt_proc], 0 + mov [con.rx_mac_proc], 0 + mov [con.tx_mac_proc], 0 + mov [con.rx_mac_length], 0 + mov [con.tx_mac_length], 0 + + DEBUGF 2, "Sending KEX init\n" mov edi, ssh_kex.cookie call MBRandom stosd @@ -226,32 +333,31 @@ resolve: stosd call MBRandom stosd - stdcall ssh_send_packet, [socketnum], ssh_kex, ssh_kex.length, 0 + stdcall ssh_send_packet, con, ssh_kex, ssh_kex.length, 0 cmp eax, -1 je socket_err ; HASH: string I_C, the payload of the client's SSH_MSG_KEXINIT - mov eax, [tx_buffer+ssh_header.length] + mov eax, dword[con.tx_buffer+ssh_packet_header.packet_length] bswap eax - movzx ebx, [tx_buffer+ssh_header.padding] + movzx ebx, [con.tx_buffer+ssh_packet_header.padding_length] sub eax, ebx dec eax lea edx, [eax+4] bswap eax - mov [tx_buffer+1], eax - mov esi, tx_buffer+1 - call sha256_update + mov dword[con.tx_buffer+1], eax + invoke sha256_update, con.temp_ctx, con.tx_buffer+1, edx -; Check key exchange init of server - stdcall ssh_recv_packet, [socketnum], rx_buffer, BUFFERSIZE, 0 +; << Check key exchange init of server + stdcall ssh_recv_packet, con, 0 cmp eax, -1 je socket_err - cmp [rx_buffer+ssh_header.message_code], SSH_MSG_KEXINIT + cmp [con.rx_buffer.message_code], SSH_MSG_KEXINIT jne proto_err - DEBUGF 1, "Received KEX init\n" + DEBUGF 2, "Received KEX init\n" - lea esi, [rx_buffer+sizeof.ssh_header+16] + lea esi, [con.rx_buffer+sizeof.ssh_packet_header+16] lodsd bswap eax DEBUGF 1, "kex_algorithms: %s\n", esi @@ -295,38 +401,144 @@ resolve: lodsb DEBUGF 1, "KEX First Packet Follows: %u\n", al - ; TODO + ; TODO: parse this structure and init procedures accordingly ; HASH: string I_S, the payload of the servers's SSH_MSG_KEXINIT - mov eax, [rx_buffer+ssh_header.length] - movzx ebx, [rx_buffer+ssh_header.padding] + mov eax, dword[con.rx_buffer+ssh_packet_header.packet_length] + movzx ebx, [con.rx_buffer+ssh_packet_header.padding_length] sub eax, ebx dec eax lea edx, [eax+4] bswap eax - mov [rx_buffer+sizeof.ssh_header-5], eax - mov esi, rx_buffer+sizeof.ssh_header-5 - call sha256_update + mov dword[con.rx_buffer+sizeof.ssh_packet_header-5], eax + invoke sha256_update, con.temp_ctx, con.rx_buffer+sizeof.ssh_packet_header-5, edx ; Exchange keys with the server + stdcall dh_gex test eax, eax jnz exit ; Set keys - DEBUGF 1, "SSH: Init encryption\n" - stdcall aes256_cbc_init, rx_iv - mov [rx_context], eax - stdcall aes256_set_encrypt_key, [rx_context], rx_enc_key - mov [decrypt_proc], aes256_cbc_decrypt - mov [rx_blocksize], 32 - DEBUGF 1, "SSH: Init decryption\n" - stdcall aes256_cbc_init, tx_iv - mov [tx_context], eax - stdcall aes256_set_decrypt_key, [tx_context], tx_enc_key - mov [encrypt_proc], aes256_cbc_encrypt - mov [tx_blocksize], 32 + DEBUGF 2, "SSH: Setting encryption keys\n" + + stdcall aes256_cbc_init, con.rx_iv + mov [con.rx_crypt_ctx_ptr], eax + + stdcall aes256_set_decrypt_key, eax, con.rx_enc_key + mov [con.rx_crypt_proc], aes256_cbc_decrypt + mov [con.rx_crypt_blocksize], AES256_BLOCKSIZE + + stdcall aes256_cbc_init, con.tx_iv + mov [con.tx_crypt_ctx_ptr], eax + + stdcall aes256_set_encrypt_key, eax, con.tx_enc_key + mov [con.tx_crypt_proc], aes256_cbc_encrypt + mov [con.tx_crypt_blocksize], AES256_BLOCKSIZE + + stdcall hmac_sha256_setkey, con.rx_mac_ctx, con.rx_int_key, SHA256_HASH_SIZE + mov [con.rx_mac_proc], hmac_sha256 + mov [con.rx_mac_length], SHA256_HASH_SIZE + + stdcall hmac_sha256_setkey, con.tx_mac_ctx, con.tx_int_key, SHA256_HASH_SIZE + mov [con.tx_mac_proc], hmac_sha256 + mov [con.tx_mac_length], SHA256_HASH_SIZE + +; TODO: erase all keys from memory and free the memory + +; >> Request service (user-auth) + + DEBUGF 2, "SSH: Requesting service\n" + + stdcall ssh_send_packet, con, ssh_request_service, ssh_request_service.length, 0 + cmp eax, -1 + je socket_err + +; << Check for service acceptance + + stdcall ssh_recv_packet, con, 0 + cmp eax, -1 + je socket_err + + cmp [con.rx_buffer.message_code], SSH_MSG_SERVICE_ACCEPT + jne proto_err + +; >> Request user authentication + +; TODO: Request username from the user +; invoke con_write_asciiz, str12 +; invoke con_gets, username, 256 +; test eax, eax +; jz done + +; TODO: implement password authentication + + DEBUGF 2, "SSH: User authentication\n" + + stdcall ssh_send_packet, con, ssh_request_userauth, ssh_request_userauth.length, 0 + cmp eax, -1 + je socket_err + +; << Check for userauth acceptance + + stdcall ssh_recv_packet, con, 0 + cmp eax, -1 + je socket_err + + cmp [con.rx_buffer.message_code], SSH_MSG_USERAUTH_SUCCESS + jne proto_err + +; >> Open channel + + DEBUGF 2, "SSH: Open channel\n" + + stdcall ssh_send_packet, con, ssh_channel_open, ssh_channel_open.length, 0 + cmp eax, -1 + je socket_err + +; << Check for channel open confirmation + + stdcall ssh_recv_packet, con, 0 + cmp eax, -1 + je socket_err + + cmp [con.rx_buffer.message_code], SSH_MSG_CHANNEL_OPEN_CONFIRMATION + jne proto_err + +; >> Channel request: pty + + DEBUGF 2, "SSH: Request pty\n" + + stdcall ssh_send_packet, con, ssh_channel_request, ssh_channel_request.length, 0 + cmp eax, -1 + je socket_err + +; << Check for channel request confirmation + + stdcall ssh_recv_packet, con, 0 + cmp eax, -1 + je socket_err + + cmp [con.rx_buffer.message_code], SSH_MSG_CHANNEL_SUCCESS + jne proto_err + +; >> Channel request: shell + + DEBUGF 2, "SSH: Request shell\n" + + stdcall ssh_send_packet, con, ssh_shell_request, ssh_shell_request.length, 0 + cmp eax, -1 + je socket_err + +; << Check for channel request confirmation (FIXME: this may not be first packet!) + +; stdcall ssh_recv_packet, con, 0 +; cmp eax, -1 +; je socket_err + +; cmp [con.rx_buffer.message_code], SSH_MSG_CHANNEL_SUCCESS +; jne proto_err ; Launch network thread mcall 18, 7 @@ -340,13 +552,26 @@ mainloop: test eax, 0x200 ; con window closed? jnz exit - stdcall ssh_recv_packet, [socketnum], rx_buffer, BUFFERSIZE, 0 - cmp eax, -1 - je closed + stdcall ssh_recv_packet, con, 0 + cmp eax, 0 + jbe closed + cmp [con.rx_buffer.message_code], SSH_MSG_CHANNEL_DATA + jne .dump + + mov eax, dword[con.rx_buffer.message_code+5] + bswap eax DEBUGF 1, 'SSH: got %u bytes of data !\n', eax - mov esi, rx_buffer + lea esi, [con.rx_buffer.message_code+5+4] + mov ecx, eax + lea edi, [esi + eax] + mov byte [edi], 0 + invoke con_write_asciiz, esi + jmp mainloop + + .dump: + lea esi, [con.rx_buffer] mov ecx, eax pusha @@: @@ -355,23 +580,22 @@ mainloop: dec ecx jnz @r popa - lea edi, [esi + eax] - mov byte [edi], 0 - invoke con_write_asciiz, esi + DEBUGF 1, "\n" jmp mainloop + proto_err: - DEBUGF 1, "SSH: protocol error\n" + DEBUGF 3, "SSH: protocol error\n" invoke con_write_asciiz, str7 jmp prompt socket_err: - DEBUGF 1, "SSH: socket error %d\n", ebx + DEBUGF 3, "SSH: socket error %d\n", ebx invoke con_write_asciiz, str6 jmp prompt dns_error: - DEBUGF 1, "SSH: DNS error %d\n", eax + DEBUGF 3, "SSH: DNS error %d\n", eax invoke con_write_asciiz, str5 jmp prompt @@ -386,8 +610,8 @@ closed: done: invoke con_exit, 1 exit: - DEBUGF 1, "SSH: Exiting\n" - mcall close, [socketnum] + DEBUGF 3, "SSH: Exiting\n" + mcall close, [con.socketnum] mcall -1 @@ -395,14 +619,8 @@ thread: mcall 40, 0 .loop: invoke con_getch2 - mov [send_data], ax - xor esi, esi - inc esi - test al, al - jnz @f - inc esi - @@: - stdcall ssh_send_packet, [socketnum], send_data, 0 + mov [ssh_channel_data+9], al + stdcall ssh_send_packet, con, ssh_channel_data, ssh_channel_data.length, 0 invoke con_get_flags test eax, 0x200 ; con window closed? @@ -423,17 +641,12 @@ str8 db ' (',0 str9 db ')',10,0 str10 db 'Invalid hostname.',10,10,0 str11 db 10,'Remote host closed the connection.',10,10,0 - -sockaddr1: - dw AF_INET4 - .port dw 0 - .ip dd 0 - rb 10 +str12 db 'Enter username: ',0 ssh_ident_ha: dd_n (ssh_ident.length-2) ssh_ident: - db "SSH-2.0-KolibriOS_SSH_0.01",13,10 + db "SSH-2.0-KolibriOS_SSH_0.02",13,10 .length = $ - ssh_ident ssh_kex: @@ -479,9 +692,9 @@ ssh_kex: ssh_gex_req: db SSH_MSG_KEX_DH_GEX_REQUEST - dd_n 128 ; DH GEX min - dd_n 256 ; DH GEX number of bits - dd_n 512 ; DH GEX Max + dd_n 128 ; DH GEX min + dd_n 256 ; DH GEX number of bits + dd_n 512 ; DH GEX Max .length = $ - ssh_gex_req @@ -490,16 +703,75 @@ ssh_new_keys: .length = $ - ssh_new_keys +ssh_request_service: + db SSH_MSG_SERVICE_REQUEST + dd_n 12 ; String length + db "ssh-userauth" ; Service name + .length = $ - ssh_request_service + + +ssh_request_userauth: + db SSH_MSG_USERAUTH_REQUEST + dd_n 12 + dd_n 8 + db "username" ; user name in ISO-10646 UTF-8 encoding [RFC3629] + dd_n 14 + db "ssh-connection" ; service name in US-ASCII + dd_n 4 + db "none" ; method name in US-ASCII +; Other options: publickey, password, hostbased + .length = $ - ssh_request_userauth + + +ssh_channel_open: + db SSH_MSG_CHANNEL_OPEN + dd_n 7 + db "session" + dd_n 0 ; Sender channel + dd_n 1024 ; Initial window size + dd_n 1024 ; maximum packet size + .length = $ - ssh_channel_open + +ssh_channel_request: + db SSH_MSG_CHANNEL_REQUEST + dd_n 0 ; Recipient channel + dd_n 7 + db "pty-req" + db 1 ; Bool: want reply + dd_n 5 + db "xterm" + dd_n 80 ; terminal width (rows) + dd_n 25 ; terminal height (rows) + dd_n 0 ; terminal width (pixels) + dd_n 0 ; terminal height (pixels) + + dd_n 0 ; list of supported opcodes + .length = $ - ssh_channel_request + +ssh_shell_request: + db SSH_MSG_CHANNEL_REQUEST + dd_n 0 ; Recipient channel + dd_n 5 + db "shell" + db 1 ; Bool: want reply + .length = $ - ssh_shell_request + +ssh_channel_data: + db SSH_MSG_CHANNEL_DATA + dd_n 0 ; Sender channel + dd_n 1 + db ? + .length = $ - ssh_channel_data + + include_debug_strings - -; import align 4 @IMPORT: library network, 'network.obj', \ - console, 'console.obj';, \ -; libcrash, 'libcrash.obj' + console, 'console.obj', \ + libcrash, 'libcrash.obj' import network, \ getaddrinfo, 'getaddrinfo', \ @@ -518,61 +790,23 @@ import console, \ con_write_string, 'con_write_string', \ con_get_flags, 'con_get_flags' -;import libcrash, \ -; crash.hash, 'crash_hash' +import libcrash, \ + sha256_init, 'sha256_init', \ + sha256_update, 'sha256_update', \ + sha256_final, 'sha256_final' IncludeIGlobals i_end: -decrypt_proc dd dummy_encrypt -encrypt_proc dd dummy_encrypt -rx_blocksize dd 4 -tx_blocksize dd 4 -rx_context dd ? -tx_context dd ? - IncludeUGlobals -socketnum dd ? -rx_packet_length dd ? ;;;;; -rx_buffer: rb BUFFERSIZE+1 -tx_buffer: rb BUFFERSIZE+1 +params rb 1024 -send_data dw ? +con ssh_connection -hostname rb 1024 - -; Diffie Hellman variables -dh_p dd ? - rb MAX_BITS/8 -dh_g dd ? - rb MAX_BITS/8 -dh_x dd ? - rb MAX_BITS/8 -dh_e dd ? - rb MAX_BITS/8 -dh_f dd ? - rb MAX_BITS/8 - -dh_signature dd ? - rb MAX_BITS/8 - -; Output from key exchange -dh_K dd ? ; Shared Secret (Big endian) - rb MAX_BITS/8 - .length dd ? ; Length in little endian - -dh_H rb 32 ; Exchange Hash -session_id rb 32 -rx_iv rb 32 ; Rx initialisation vector -tx_iv rb 32 ; Tx initialisation vector -rx_enc_key rb 32 ; Rx encryption key -tx_enc_key rb 32 ; Tx encryption key -rx_int_key rb 32 ; Rx integrity key -tx_int_key rb 32 ; Tx integrity key - -; Temporary values ; To be removed +; Temporary values ; To be removed FIXME mpint_tmp rb MPINT_MAX_LEN+4 + mem: diff --git a/programs/network/ssh/ssh_transport.inc b/programs/network/ssh/ssh_transport.inc index a6bd7995ed..6c1b8cf3dd 100644 --- a/programs/network/ssh/ssh_transport.inc +++ b/programs/network/ssh/ssh_transport.inc @@ -15,120 +15,181 @@ ; You should have received a copy of the GNU General Public License ; along with this program. If not, see . -struct ssh_header - length dd ? - padding db ? - message_code db ? + +struct ssh_packet_header + packet_length dd ? ; The length of the packet in bytes, not including 'mac' or the + ; 'packet_length' field itself. + padding_length db ? ; Length of 'random padding' (bytes). + + message_code db ? ; First byte of payload ends -proc dummy_encrypt _key, _in, _out - ret -endp - -proc ssh_recv_packet sock, buf, size, flags +proc ssh_recv_packet connection, flags locals - bufferptr dd ? - remaining dd ? - padding dd ? + data_length dd ? ; Total length of packet without MAC endl - DEBUGF 1, "ssh_recv_packet\n" + DEBUGF 2, "> " ; Receive first block (Read length, padding length, message code) - mcall recv, [sock], [buf], [rx_blocksize], [flags] - DEBUGF 1, "chunk = %u\n", eax - cmp eax, [rx_blocksize] - jne .fail ;;;; + mov ebx, [connection] + mov ecx, [ebx+ssh_connection.socketnum] + mov esi, [ebx+ssh_connection.rx_crypt_blocksize] + lea edx, [ebx+ssh_connection.rx_buffer] + mov edi, [flags] + mcall recv + DEBUGF 1, "chunk = %u ", eax + mov ebx, [connection] + cmp eax, [ebx+ssh_connection.rx_crypt_blocksize] + jne .fail -; stdcall [decrypt_proc], [rx_context], [buf], [buf] +; Decrypt first block + cmp [ebx+ssh_connection.rx_crypt_proc], 0 + je @f + pusha + lea esi, [ebx+ssh_connection.rx_buffer] + stdcall [ebx+ssh_connection.rx_crypt_proc], [ebx+ssh_connection.rx_crypt_ctx_ptr], esi, esi + popa + @@: - mov ebx, [buf] - movzx eax, [ebx+ssh_header.padding] - mov [padding], eax - mov eax, [ebx+ssh_header.length] - bswap eax ; length to little endian - mov [ebx+ssh_header.length], eax - DEBUGF 1, "ssh_recv_packet length = %u\n", eax +; Check data length + mov esi, [ebx+ssh_connection.rx_buffer.packet_length] + bswap esi ; convert length to little endian + mov [ebx+ssh_connection.rx_buffer.packet_length], esi + DEBUGF 1, "packet length=%u ", esi + cmp esi, BUFFERSIZE + ja .fail ; packet is too large - cmp eax, [size] - ja .fail ;;;; +; Calculate amount of remaining data + add esi, 4 ; Packet length field itself is not included in the count + sub esi, [ebx+ssh_connection.rx_crypt_blocksize] ; Already received this amount of data + add esi, [ebx+ssh_connection.rx_mac_length] + jz .got_all_data - sub eax, [rx_blocksize] - add eax, 4 - mov [remaining], eax - add ebx, [rx_blocksize] - mov [bufferptr], ebx +; Receive remaining data + lea edx, [ebx+ssh_connection.rx_buffer] + add edx, [ebx+ssh_connection.rx_crypt_blocksize] + mov ecx, [ebx+ssh_connection.socketnum] + mov edi, [flags] .receive_loop: - mcall recv, [sock], [bufferptr], [remaining], 0 - DEBUGF 1, "chunk = %u\n", eax + mcall recv + DEBUGF 1, "chunk = %u ", eax cmp eax, 0 jbe .fail - add [bufferptr], eax - sub [remaining], eax - ja .receive_loop + add edx, eax + sub esi, eax + jnz .receive_loop -; .decrypt_loop: -; stdcall [decrypt_proc], [rx_context], [buf], [buf] -; ja .decrypt_loop +; Decrypt data + mov ebx, [connection] + cmp [ebx+ssh_connection.rx_crypt_proc], 0 + je .decrypt_complete + mov ecx, [ebx+ssh_connection.rx_buffer.packet_length] + add ecx, 4 ; Packet_length field itself + sub ecx, [ebx+ssh_connection.rx_crypt_blocksize] ; Already decrypted this amount of data + jz .decrypt_complete -; .hmac_loop: -; TODO -; ja .hmac_loop + lea esi, [ebx+ssh_connection.rx_buffer] + add esi, [ebx+ssh_connection.rx_crypt_blocksize] + .decrypt_loop: + pusha + stdcall [ebx+ssh_connection.rx_crypt_proc], [ebx+ssh_connection.rx_crypt_ctx_ptr], esi, esi + popa + add esi, [ebx+ssh_connection.rx_crypt_blocksize] + sub ecx, [ebx+ssh_connection.rx_crypt_blocksize] + jnz .decrypt_loop + .decrypt_complete: -; Return usefull data length in eax - mov eax, [buf] - movzx ebx, [eax+ssh_header.padding] - mov eax, [eax+ssh_header.length] +; Authenticate message + cmp [ebx+ssh_connection.rx_mac_proc], 0 + je .mac_complete + lea esi, [ebx+ssh_connection.rx_seq] + mov ecx, [ebx+ssh_connection.rx_buffer.packet_length] + add ecx, 8 ; packet_length field itself + sequence number + lea eax, [ebx+ssh_connection.rx_mac_ctx] + mov edx, [ebx+ssh_connection.rx_buffer.packet_length] + bswap edx ; convert length to big endian + mov [ebx+ssh_connection.rx_buffer.packet_length], edx + stdcall [ebx+ssh_connection.rx_mac_proc], eax, esi, ecx + mov edx, [ebx+ssh_connection.rx_buffer.packet_length] + bswap edx ; convert length to little endian + mov [ebx+ssh_connection.rx_buffer.packet_length], edx + + lea esi, [ebx+ssh_connection.rx_mac_ctx] + lea edi, [ebx+ssh_connection.rx_buffer] + add edi, [ebx+ssh_connection.rx_buffer.packet_length] + add edi, 4 + mov ecx, [ebx+ssh_connection.rx_mac_length] + shr ecx, 2 + repe cmpsd + jne .mac_failed + .mac_complete: + inc byte[ebx+ssh_connection.rx_seq+3] ; Update sequence counter + jnc @f + inc byte[ebx+ssh_connection.rx_seq+2] + jnc @f + inc byte[ebx+ssh_connection.rx_seq+1] + jnc @f + inc byte[ebx+ssh_connection.rx_seq+0] + @@: + +; Return useful data length to the caller via eax register + .got_all_data: + mov eax, [ebx+ssh_connection.rx_buffer.packet_length] + movzx ebx, [ebx+ssh_connection.rx_buffer.padding_length] sub eax, ebx - DEBUGF 1, "ssh_recv_packet complete, usefull data length=%u\n", eax + DEBUGF 1, "useful data length=%u\n", eax ret .fail: - DEBUGF 1, "ssh_recv_packet failed!\n" + DEBUGF 3, "ssh_recv_packet failed!\n" + mov eax, -1 + ret + + .mac_failed: + DEBUGF 3, "ssh_recv_packet MAC failed!\n" mov eax, -1 ret endp -proc ssh_send_packet sock, buf, payloadsize, flags +proc ssh_send_packet connection, buf, payload_size, flags locals - size dd ? + packet_size dd ? endl - DEBUGF 1, "ssh_send_packet: size=%u\n", [payloadsize] + DEBUGF 2, "< " - mov eax, [payloadsize] - inc eax ; padding length byte - - lea edx, [eax+4] ; total packet size (without padding) - mov [size], edx - mov ebx, [tx_blocksize] +; Pad the packet with random data + mov eax, [payload_size] + inc eax ; padding length byte + lea edx, [eax+4] ; total packet size (without padding and MAC) + mov [packet_size], edx + mov ecx, [connection] + mov ebx, [ecx+ssh_connection.tx_crypt_blocksize] dec ebx and edx, ebx neg edx - add edx, [tx_blocksize] - cmp edx, 4 ; minimum padding size + add edx, [ecx+ssh_connection.tx_crypt_blocksize] + cmp edx, 4 ; minimum padding size jae @f - add edx, [tx_blocksize] + add edx, [ecx+ssh_connection.tx_crypt_blocksize] @@: - DEBUGF 1, "Padding %u bytes\n", edx - add [size], edx + DEBUGF 1, "padding %u bytes ", edx + add [packet_size], edx add eax, edx - DEBUGF 1, "Total size: %u\n", eax + DEBUGF 1, "total size: %u ", eax bswap eax - mov edi, tx_buffer - stosd + lea edi, [ecx+ssh_connection.tx_buffer] + stosd ; packet_length mov al, dl - stosb + stosb ; padding_length mov esi, [buf] -; cmp esi, edi -; je @f - mov ecx, [payloadsize] + mov ecx, [payload_size] rep movsb -; @@: mov ebx, edx mov esi, edx @@ -146,8 +207,59 @@ endl dec esi jnz @r - mcall send, [sock], tx_buffer, [size], [flags] +; Message authentication + mov edx, [connection] + cmp [edx+ssh_connection.tx_mac_proc], 0 + je .mac_complete +; DEBUGF 1, "MAC sequence number: 0x%x\n", [edx+ssh_connection.tx_seq] + lea esi, [edx+ssh_connection.tx_seq] + mov ecx, [packet_size] + add ecx, 4 ; Sequence number length + lea eax, [edx+ssh_connection.tx_mac_ctx] + stdcall [edx+ssh_connection.tx_mac_proc], eax, esi, ecx + + lea esi, [edx+ssh_connection.tx_mac_ctx] + lea edi, [edx+ssh_connection.tx_buffer] + add edi, [packet_size] + mov ecx, [edx+ssh_connection.tx_mac_length] + shr ecx, 2 + rep movsd + .mac_complete: + inc byte[edx+ssh_connection.tx_seq+3] ; Update sequence counter + jnc @f + inc byte[edx+ssh_connection.tx_seq+2] + jnc @f + inc byte[edx+ssh_connection.tx_seq+1] + jnc @f + inc byte[edx+ssh_connection.tx_seq+0] + @@: + +; Encrypt data + cmp [edx+ssh_connection.tx_crypt_proc], 0 + je .encrypt_complete + lea esi, [edx+ssh_connection.tx_buffer] + mov ecx, [packet_size] + .encrypt_loop: + pusha + stdcall [edx+ssh_connection.tx_crypt_proc], [edx+ssh_connection.tx_crypt_ctx_ptr], esi, esi + popa + add esi, [edx+ssh_connection.tx_crypt_blocksize] + sub ecx, [edx+ssh_connection.tx_crypt_blocksize] + jnz .encrypt_loop + .encrypt_complete: + +; Send the packet + mov ebx, [connection] + mov ecx, [ebx+ssh_connection.socketnum] + lea edx, [ebx+ssh_connection.tx_buffer] + mov esi, [packet_size] + add esi, [ebx+ssh_connection.tx_mac_length] + mov edi, [flags] + mcall send + + DEBUGF 1, "\n" ret -endp \ No newline at end of file +endp +